by edward | Nov 7, 2023 | Exchange 2016
In one of my lab machines I was sifting through the log files and came across Event ID 12000 as shown below. As this lab machine does not have internet access at all, the error was a bit strange and no other alerts were raised. Nothing out of the ordinary was done...
by edward | Nov 6, 2023 | Exchange 2016, Exchange 2013, Exchange 2019, NMAP, NMAP Scripting Engine, NSE
Over the past few years, Microsoft Exchange Server has come under heavy attack and with each new Cumulative Update (CU) and Security Update (SU), CVE’s are addressed and closed. The problem comes in when organisations do not patch servers (as mentioned in a few...
by edward | Jul 22, 2023 | Exchange 2016
We all know about the ongoing attacks on Exchange Servers and it is vitally important that you keep up-to-date with patching of your environments, even if it is standalone servers that are just performing management functions. Each Cumulative update (CU) and Security...
by edward | Dec 2, 2022 | Exchange 2016, Exchange 2013, Exchange 2019
If you are new to Exchange, let me bring you up to speed with how attacks have increased since 2020 and Exchange servers that are published to the internet are vulnerable if not locked down. Back in the day, Admins would not patch anything because “it...
by edward | Oct 20, 2022 | Exchange 2016, Exchange 2013, Exchange 2019
The October 2022 security updates for the different Exchange versions are out and it is advisable to update your servers. In my lab, I am running different versions of Exchange servers but I updated my 2019 Exchange servers today. I added a few screenshots to show you...
by edward | Oct 17, 2022 | Exchange 2016, Exchange 2013, Exchange 2019
At the MEC event that recently took place, it was announced that you can now introduce Windows Server 2022 domain controllers if you are using the latest Cumulative Updates for Exchange 2013 and Exchange 2016. Below is a snippet from the supportability matrix on the...